US20110173459A1 - Bios lock encode/decode driver - Google Patents

Bios lock encode/decode driver Download PDF

Info

Publication number
US20110173459A1
US20110173459A1 US13/051,324 US201113051324A US2011173459A1 US 20110173459 A1 US20110173459 A1 US 20110173459A1 US 201113051324 A US201113051324 A US 201113051324A US 2011173459 A1 US2011173459 A1 US 2011173459A1
Authority
US
United States
Prior art keywords
apparatus
processors configured
computer
decode
computer processors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/051,324
Other versions
US8856551B2 (en
Inventor
Duane Allen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Micron Technology Inc
Original Assignee
Micron Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US09/661,540 priority Critical patent/US6983372B1/en
Priority to US11/216,208 priority patent/US7191345B2/en
Priority to US11/685,116 priority patent/US7917962B2/en
Application filed by Micron Technology Inc filed Critical Micron Technology Inc
Priority to US13/051,324 priority patent/US8856551B2/en
Assigned to MEI CALIFORNIA, INC. reassignment MEI CALIFORNIA, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON ELECTRONICS, INC.
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MEI CALIFORNIA, INC.
Assigned to MICRON ELECTRONICS, INC. reassignment MICRON ELECTRONICS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALLEN, DUANE
Publication of US20110173459A1 publication Critical patent/US20110173459A1/en
Application granted granted Critical
Publication of US8856551B2 publication Critical patent/US8856551B2/en
Assigned to U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON TECHNOLOGY, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT reassignment MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: MICRON TECHNOLOGY, INC.
Assigned to U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST. Assignors: MICRON TECHNOLOGY, INC.
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICRON SEMICONDUCTOR PRODUCTS, INC., MICRON TECHNOLOGY, INC.
Assigned to MICRON TECHNOLOGY, INC. reassignment MICRON TECHNOLOGY, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT
Application status is Active legal-status Critical
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate.

Description

  • This application is a continuation of U.S. application Ser. No. 11/685,116, filed on Mar. 12, 2007, which is a continuation of U.S. application Ser. No. 11/216,208, filed on Aug. 31, 2005, now U.S. Pat. No. 7,191,345, which is a continuation of U.S. patent application Ser. No. 09/661,540, filed on Sep. 14, 2000, now U.S. Pat. No. 6,983,372, the entirety of which are hereby incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • This invention relates to the field of software security and further relates to systems and methods for restricting any unauthorized use of software.
  • 2. Description of the Related Art
  • It has become commonplace to sell computers including personal computers (PCs) with software. It has also become commonplace for the software to be provided on removable media such as compact disks (CD-ROM, compact disk-read only memory), zip disks, or floppy disks. The purchaser of the PC then loads the software onto the PC by placing the removable media into an appropriate removable media reader in the PC. The removable media reader then reads the software and the software is transferred to the memory of the PC.
  • Consumer software is typically licensed for use on a single computer. However, it is difficult to control the use of the software once it is in the possession of the consumer. Therefore, there is a need for systems and methods which prevent the unauthorized access or use of software and data on removable media.
  • SUMMARY OF THE INVENTION
  • The present invention provides systems and methods for preventing the unauthorized access to encoded content stored on removable media. Such content includes computer software such as operating systems and application programs.
  • One aspect of the invention includes a computer system for controlling the unauthorized use of software. The system includes a host processor and a removable media reading device coupled to the host processor. A non-volatile memory is coupled to the host processor and includes a predetermined location for storing a signature. A bootup program is stored in the non-volatile memory and is configured such that upon execution by the host processor, the computer system will only be configured to decode encoded media which is placed in the removable media device if the signature is located in the predetermined location.
  • Another aspect of the invention includes a method of reading encoded data from a removable media device in a computer system. The method includes initiating a request for data from the removable media reader and determining whether the system is authorized to decode the encoded data. If the system is authorized to decode the encoded data, the method then determines whether the first sector on the removable media is encoded. If the system is authorized to decode encoded data and the first sector on the removable media is encoded, the requested data is decoded.
  • In a further aspect of the invention, determining whether the system is authorized to decode encoded data includes verifying that a signature is stored in the system in a predetermined memory location.
  • In another aspect of the invention, a method of preventing unauthorized access to encoded contents stored on removable media by a computer system running an operating system is disclosed. The method includes running a memory-resident program with a lockable decoding function to control the interaction between the operating system and the removable media reader. The method includes scanning the computer system for a predetermined signature and unlocking the lockable decoding function if the signature is found. Removable medium is examined to determine whether it is encoded. If the removable medium is encoded, the lockable decoding function is enabled. Finally, data from the removable medium is decoded if the lockable decoding function is enabled.
  • In another aspect of the method, the memory resident program is inserted between the operating system and a device driver for the removable media reader.
  • In a further aspect of the method, the memory resident program adds at least one modular driver between the operating system and the removable media reader.
  • In a further aspect of the method, the predetermined signature is stored in a basic input output system circuitry of the computer system.
  • In another aspect of the invention includes a method of preventing unauthorized access to encoded contents stored on removable media by a computer system running an operating system and having a removable media reader. The method includes inserting a driver with a lockable decoding function between the operating system and the device driver for the removable media reader to control the transfer of the information between the operating system and the removable media reader. Further, the method includes scanning the computer system for a predetermined signature and unlocking the lockable decoding function if the signature is found. The method also includes examining a removable medium to determine whether it is encoded and enabling said lockable decoding function if the removable medium is encoded. Finally, data is decoded from the removable medium if the lockable decoding function is enabled.
  • Another aspect of the invention relates to a method of preventing unauthorized access to encoding content stored on removable media. The method includes adding one modular driver between an operating system and the removable media reader to incorporate a lockable decoding function to control the transfer of information between the operating system and the removable media reader. The method also includes scanning the computer system for a predetermined key and unlocking the lockable decoding function if the signature is found. Next, the method includes examining a removable medium to determine whether it is encoded and enabling the lockable decoding function if the removable medium is encoded. Finally, data from the removable medium is decoded if the lockable decoding function is enabled.
  • These and other aspects and advantages of the present invention will be come more apparent upon a detailed review of the following detailed description and the accompanying figures.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features and advantages of the present invention will become more apparent from the following detailed description of the present invention in conjunction with the drawings in which:
  • FIG. 1 is a block diagram of functional elements of a computer system, such as a personal computer;
  • FIG. 2 is a flowchart representing the steps or process of bootup in a DOS system according to aspects of the present invention;
  • FIG. 2 a is a block diagram representing software drivers;
  • FIG. 3 is a flowchart of the process or method which can be carried out when removable media is first inserted into a reader in a DOS-based system;
  • FIG. 4 is a flowchart which represents the process or method of reading removable media according to aspects of the present invention;
  • FIGS. 5 and 5A are flowcharts which represents the process or method which occurs upon the loading of a NT/2000-type operating system according to aspects of the present invention;
  • FIG. 6 is a flowchart which represents the process or method for determining whether removable media is encoded according to aspects of the present invention on a NT/2000-type operating system;
  • FIG. 7 is a flowchart which represents the process or method for reading removable media according to aspects of the present invention on a NT/2000-type operating system;
  • FIG. 8 is a flowchart which represents a process or method of encode detection carried out by a removable media reader; and
  • FIG. 9 is a flowchart which represents a process or method of reading and decoding carried out by a removable media reader.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • FIG. 1 is a block diagram of an exemplary computer system 10. The computer system can include a chip set 51 which operates as an interface to support communications between a host processor 50, system memory 52, and devices coupled to a system bus 53. The host processor 50 may include logic circuitry as well as an amount of non-volatile memory 65 used to contain key information. System memory 52 may include but is not limited to conventional memory such as various types of random access memory (RAM) and, for example, DRAM, VRAM, SRAM, etc. as well as memory-mapped I/O devices.
  • System bus 53 may be implemented in compliance with any type of bus architecture including peripheral component interconnect (PCI) and universal serial bus (USB) and the like.
  • One of the devices that may be coupled to the system bus 53 is a non-volatile memory 62 which interfaces with the system bus 53 via a bus interface 60. Also connected to system bus 53 can be a removable media reading device, such as a CD-ROM drive 70. Contained within a non-volatile memory 62 are the software instructions 63 used by the computer system during the system power-up (boot) sequence.
  • Also stored within the non-volatile memory 62 (alternatively stored in non-volatile memory 65) is the basic input/output software program (BIOS) 64. According to an aspect of the present invention, a signature or key 66 can also be stored in the non-volatile memory. Alternatively the signature can be stored in the non-volatile memory of the host processor itself on another memory location within the computer system. The signature 66 may be stored in a non-volatile memory location that is accessible by the manufacturer during the final assembly process of the computer system. The signature can be an identifier which identifies a computer system.
  • Referring to FIG. 2, FIG. 2 is a flowchart which represents steps carried out during the system bootup according to aspects of the present invention as implemented on a FAT (file allocation table) based operating system. These steps can be carried out by the host processor 50 shown in FIG. 1 under the control of memory-resident programs, such as software drivers, which reside in the system memory after being loaded.
  • As represented by block 202, a software driver for the removable media reader which has a CD drive is loaded into the system memory. A driver is software that enables the operating system to communicate with hardware. Typically the driver is loaded from media such as removable media such as a floppy disk or from fixed media such as a hard disk drive. Next, as represented by block 204, a BIOS lock driver is loaded into the system memory. As represented by the block 206, the BIOS lock driver then causes the system to search for the signature, which can be stored, for example, in the non-volatile memory 62 shown in FIG. 1. As represented by block 208, if the signature is located, the system, as represented by block 210, sets (unlocks) the decode ability of the BIOS lock driver. However, if the signature is not located, the decode ability is not set, thus remaining locked. As represented by block 212, the BIOS system driver is then loaded into the system memory and includes the name of the BIOS lock driver. When software (for example, the file system driver 220 depicted in FIG. 2 a and described further below) seeks to or requests to read information from the CD drive, instead of sending that request to the CD driver, that request will be sent to the BIOS lock driver.
  • FIG. 2 a is a block diagram representation of the three drivers discussed in FIG. 2. As represented by FIG. 2 a, the process of FIG. 2 installed the file system driver 220 and linked it to the BIOS lock driver 222. The BIOS lock driver is linked to the CD driver 224. Therefore, read requests from the file system driver to the CD drive driver 224 are past through the BIOS lock driver 222.
  • Referring to FIG. 3, FIG. 3 is a flowchart representing the process or method which occurs when a removable media, such as a compact or CD, is inserted into the removable media reader according to aspects of the present invention.
  • As represented by block 302, after a CD is inserted into the CD drive (for example CD drive 70 of FIG. 1), the file system driver requests the status of the CD from the BIOS lock driver. As is represented by block 304, the BIOS lock driver passes that request to the CD drive driver. The CD drive can generate a hardware interrupt to flag or notify the computer system that the status of the CD needs to be checked before accessing the CD. The interrupt can be generated because new media has been inserted into the CD drive and could be caused by a number of error conditions.
  • As represented by block 306, if this is a new CD inserted into the drive, i.e., a CD the status of which has not been already determined, and, as represented by block 308, if the decode ability has been set (see FIG. 2), then, as represented by block 310, the BIOS lock driver requests the first sector of the CD from the CD driver. As represented by block 312, the BIOS lock driver determines whether the first sector from the CD is encoded. The decoding process or algorithm of the BIOS lock driver is then set On (enabled) if the sector is encoded or it is set Off (disabled) if the sector is not encoded. As represented by block 314, the BIOS lock driver then passes the insert status of the CD to the file system driver.
  • Referring again to block 308, if the decode ability of the BIOS lock driver has not been set (see FIG. 2), the process proceeds from block 308 directly to block 314. Additionally, referring back to block 306, if the CD is not a new CD (i.e., its status has already been determined), the process proceeds directly from block 306 to block 314.
  • Referring to FIG. 4, FIG. 4 is a flowchart which represents the process associated with the computer system reading the information stored on removable media such as a CD. In order for the computer system 10 to retrieve or read information from the removable media in the removable media reader, such as CD drive 70 of FIG. 1, as represented by block 402, the file system driver requests sectors on the CD from the BIOS lock driver. As represented by block 404, the BIOS lock driver passes the request to the CD drive driver.
  • As represented by block 406, the BIOS lock driver determines whether the decoding has been set (see block 308 of FIG. 3). If the decoding is set, as represented by block 408, the BIOS lock driver decodes each sector as it is received from the CD drive driver. The sectors are then passed to the file system driver as represented by block 410.
  • Referring again to block 406, if the decoding is not set, decoding is not performed and the requested sectors are passed to the file system driving without decoding.
  • We now turn to computer systems, such as system 10 depicted in FIG. 1, operating under control of Windows NT/2000 or similar type operating system (referred to as an NT system). In an NT system, there are generally two ways of interfacing with hardware. The first is referred to as monolithic, which means there is just one driver that handles all of the interaction with a piece of hardware. The second is referred to as modular, which means there can be several levels of drivers which are gone through to the hardware. Taking the CD-ROM as a modular example, and referring to FIG. 5 a, the first driver that gets a request for data from the CD is the CD-ROM file system driver 530. This driver knows the format of data files stored on a CD, as opposed to another file system driver that knows the format of audio stored on a CD. The next level can be one or more upper filter drivers 528 that add value to the data coming from the CD-ROM class function driver. The class function driver 526 defines the base functions that are defined for all CD-ROMs such as read sector, play, stop, rewind, check for data corruption etc. The next level can be one or more lower filter drivers 524 that add value to the data coming from the port drivers 520. The port drivers 520 know how to communicate with the different buses such as SCSI, IDE, etc. Attached to the port drivers 520 are mini-port drivers 522 that are designed to handle special functions of a device that the port driver does not implement.
  • Referring to FIG. 5, FIG. 5 is a flowchart which represents the process or method executed upon bootup of a computer system which is running on an NTFS (NT file system) based operating system according to aspects of the present invention. The process is carried out by the computer system operating under the control of software or firmware, such as a bootup module, as is commonly known in the art.
  • As represented by block 502, low-level drivers, and the class function for driver for CD-ROMS are loaded into the system memory. For example, they can be loaded from removable media or from the hard disk drive.
  • As represented by block 504, the BIOS lock is then similarly loaded into the system memory. The BIOS lock can be implemented as an upper filter driver (see, FIG. 5 a, block 528). As represented by block 506, functions are then all set to pass through to the class function driver. Because there are several functions that will not be trapped, initially, all functions are set to pass through the BIOS lock.
  • As represented by block 508, the system then scans for the signature, such as the signature 66 shown in FIG. 1. This can be accomplished, for example, by reading the contents of a predetermined non-volatile memory address and comparing those contents with information stored on the removable media. As represented by block 510, if the signature is located the process then proceeds to block 512. In block 512, traps on read and device-control functions are then set so that those functions will pass through the BIOS lock upper filter driver. In other words, when those functions are to be used, control is first passed to the BIOS lock upper filter driver. However, if, as represented by block 510, the signature is not found, the traps on the read and control functions are left (as they were set in block 506) to pass through the BIOS lock upper filter driver without modification.
  • Referring to FIG. 6, FIG. 6 is a flowchart which represents the process or method which can be carried out by the BIOS lock upper filter driver to trap the sub function “check verify”. This process determines whether a CD is encoded the first time the CD is accessed. The sub function check verify determines, for example, for a CD drive, how many times a CD has been changed since the driver has been started. That information is stored in a memory location referred to as “change count”.
  • As represented by block 602, if the subfunction is verified, as represented by block 604, a change count is read from the class function driver. As represented by block 606, if the count has changed (indicating, for example, in the case of a CD drive, that a new CD has been inserted into the drive), as represented by block 608, the first sector is read from the low-level driver. The BIOS lock upper filter driver then determines whether that first sector is encoded. If that sector is encoded, the BIOS lock upper filter driver sets the decoding to On, or if it is not encoded the decoding is not set to On as represented by block 610.
  • However, referring back to block 606, if the count has not changed, (indicating, for example, in the case of a CD drive, that a new CD has not been inserted) the process proceeds directly to block 612. Similarly, referring back to block 602, if the device control function that has been requested is not check verify, the process proceeds directly to block 612.
  • As represented by block 612, device-control function is then passed to the class function driver. The process does not break the flow of data between drivers. It simply turns on or off the decode for the read function. Therefore, device control function is passed on to the class function driver. Next, as represented by block 614, the results are then passed to the calling driver.
  • Referring now to FIG. 7, FIG. 7 is a flowchart which represents the process or method carried out in a computer operating system, for example, with an NT system, to perform a read function from a removable media device such as a CD drive. As represented by block 702, the read function or read request is passed to the class function driver from a calling driver. As represented by block 704, the BIOS lock upper filter driver determines whether decoding is set On. If the decoding is set On, as represented by block 706, the BIOS lock upper filter driver decodes sectors as they are received from the class function driver. As represented by block 708, those sectors are then passed to the calling driver. However, referring again to block 704, if the decoding is not set On, sectors are passed to the calling driver without being decoded.
  • FIGS. 8 and 9 represent processes or methods associated with an aspect of the present invention when the functionality of the detection of encoded data on the removable media, such as represented by blocks 608 and 610 of FIG. 6, and the decoding of such data, such as is represented by blocks 704 and 706 of FIG. 7, are placed within the firmware of the removable media reader such as the BIOS 71 of the CD drive 70 of FIG. 1. The functions represented by FIGS. 8 and 9 can be implemented by the BIOS software or firmware running on the removable media reader. In such a system the BIOS lock upper filter driver would not be needed.
  • Referring to FIG. 8, as represented by block 802, the CD drive (or other such device) first reads the first sector of data. As represented by block 804, the CD drive sets decoding On or Off based upon its determination of whether the first sector is encoded.
  • FIG. 9 is a flowchart representing aspects of the read function carried out in the firmware of the CD drive. As represented by block 902, the CD drive first reads the sectors requested by the driver. As represented by block 904, if the decoding is set On, the process then proceeds to block 906. As represented by block 906, the sectors are decoded. As represented by block 908, the sectors are then passed to the CD drive driver (224 of FIG. 2A). Referring back to block 904, if the decoding is not set On, the process proceeds directly to block 908.
  • In a system operating as represented by FIGS. 8 and 9, the process depicted in FIG. 8 would take place each time a new CD was inserted into the drive. The CD drive BIOS recognizes when a new CD is inserted. Because the BIOS will only recognize a specific encoding scheme, no signature is needed. (However, a signature could be used to provide additional security.) In other words, a CD that is encoded with a different scheme would not be recognized as encoded by the process of FIG. 8. Therefore, decode would not be set ON. When data was read from the CD in accordance with the process of FIG. 9, it would not be decoded and would be sent in an unrecognizable form to the computer.
  • While this invention has been described with reference to specific embodiments, this description is not intended to be construed in a limiting sense. Various modifications of the described embodiments, as well as other embodiments of the invention which are apparent to persons skilled in the art, are deemed to lie within the spirit and scope of the invention. For example, though embodiments of the invention have been described with reference to a personal computer, the invention can be implemented in other types of computer systems. Additionally, though the invention has been described with reference to DOS and Windows NT operating systems, it will be apparent to those of ordinary skill in the art that this system can also be readily adapted to other operating systems.

Claims (20)

1. An apparatus comprising:
one or more computer processors configured to read a location for storing an identifier in a non-volatile memory coupled to a computer;
one or more computer processors configured to unlock a lockable decode function when the identifier is located in the location;
one or more computer processors configured to read a first sector of data from a removable medium in a removable media reading device coupled to the computer when the lockable decode function is unlocked;
one or more computer processors configured to enable the unlocked decode function when the first sector is encoded; and
one or more computer processors configured to decode encoded data from the removable medium when the unlocked decode function is enabled.
2. The apparatus of claim 1, wherein the identifier is a signature.
3. The apparatus of claim 1, wherein the identifier is stored within the non-volatile memory of a host processor associated with the computer.
4. The apparatus of claim 1, wherein a decode ability of the lockable decode function is set when the identifier is located in the location during a system bootup.
5. The apparatus of claim 1 further comprising one or more computer processors configured to disable the unlocked decode function when the first sector is not encoded.
6. The apparatus of claim 1, wherein the removable medium is a CD-ROM.
7. The apparatus of claim 1, wherein the removable media reading device sends an interrupt to notify the computer that the removable medium has been inserted in the removable media reading device.
8. An apparatus comprising:
a memory-resident program between a driver for an operating system and a driver for a media reader;
one or more computer processors configured to execute the memory-resident program to read a location for storing an identifier in a non-volatile memory coupled to a computer;
one or more computer processors configured to set a decode ability of a lockable decode function when the identifier is located in the location; and
one or more computer processors configured to enable the computer to decode encoded data from the media reader when the decode ability is set.
9. The apparatus of claim 8, wherein the identifier is a signature.
10. The apparatus of claim 8 further comprising one or more computer processors configured to determine if data from the media reader is encoded when the decode ability is set.
11. The apparatus of claim 10 further comprising one or more computer processors configured to enable a decoding algorithm when the data is encoded.
12. The apparatus of claim 11 further comprising one or more computer processors configured to disable the decoding algorithm when the data is not encoded.
13. An apparatus comprising:
one or more computer processors configured to obtain status of a removable medium in a removable media reading device coupled to a computer system;
one or more computer processors configured to cause a computer to read a location for storing an identifier in a non-volatile memory coupled to the computer;
one or more computer processors configured to set a decode ability of a lockable decode function when the identifier is located in the location; and
one or more computer processors configured to enable the computer to decode encoded data from the removable medium when the obtained status of the removable medium is a selected status and when the decode ability is set.
14. The apparatus of claim 13, wherein the identifier is a signature.
15. The apparatus of claim 13 further comprising one or more computer processors configured to read a first portion of data from the removable medium when the decode ability is set.
16. The apparatus of claim 16 further comprising one or more computer processors configured to enable a decoding algorithm when the first portion is encoded.
17. The apparatus of claim 17 further comprising one or more computer processors configured to disable the decoding algorithm when the first portion is not encoded.
18. The apparatus of claim 13, wherein the selected status indicates that the status of the removable medium has not been already determined.
19. The apparatus of claim 13, wherein data from the removable medium is passed to the computer without being decoded when the decode ability is not set.
20. The apparatus of claim 13 further comprising one or more computer processors configured to read data from the removable medium without decoding when the decode ability of the lockable decode function is not set.
US13/051,324 2000-09-14 2011-03-18 BIOS lock encode/decode driver Active 2023-01-02 US8856551B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US09/661,540 US6983372B1 (en) 2000-09-14 2000-09-14 BIOS lock CD-ROM encode/decode driver
US11/216,208 US7191345B2 (en) 2000-09-14 2005-08-31 BIOS lock encode/decode driver
US11/685,116 US7917962B2 (en) 2000-09-14 2007-03-12 BIOS lock encode/decode driver
US13/051,324 US8856551B2 (en) 2000-09-14 2011-03-18 BIOS lock encode/decode driver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/051,324 US8856551B2 (en) 2000-09-14 2011-03-18 BIOS lock encode/decode driver

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/685,116 Continuation US7917962B2 (en) 2000-09-14 2007-03-12 BIOS lock encode/decode driver

Publications (2)

Publication Number Publication Date
US20110173459A1 true US20110173459A1 (en) 2011-07-14
US8856551B2 US8856551B2 (en) 2014-10-07

Family

ID=35376727

Family Applications (5)

Application Number Title Priority Date Filing Date
US09/661,540 Active 2023-10-21 US6983372B1 (en) 2000-09-14 2000-09-14 BIOS lock CD-ROM encode/decode driver
US11/190,420 Active US7225469B2 (en) 2000-09-14 2005-07-27 BIOS lock encode/decode driver
US11/216,208 Active US7191345B2 (en) 2000-09-14 2005-08-31 BIOS lock encode/decode driver
US11/685,116 Active 2022-08-23 US7917962B2 (en) 2000-09-14 2007-03-12 BIOS lock encode/decode driver
US13/051,324 Active 2023-01-02 US8856551B2 (en) 2000-09-14 2011-03-18 BIOS lock encode/decode driver

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US09/661,540 Active 2023-10-21 US6983372B1 (en) 2000-09-14 2000-09-14 BIOS lock CD-ROM encode/decode driver
US11/190,420 Active US7225469B2 (en) 2000-09-14 2005-07-27 BIOS lock encode/decode driver
US11/216,208 Active US7191345B2 (en) 2000-09-14 2005-08-31 BIOS lock encode/decode driver
US11/685,116 Active 2022-08-23 US7917962B2 (en) 2000-09-14 2007-03-12 BIOS lock encode/decode driver

Country Status (1)

Country Link
US (5) US6983372B1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6983372B1 (en) * 2000-09-14 2006-01-03 Micron Technology, Inc. BIOS lock CD-ROM encode/decode driver
KR100610011B1 (en) * 2004-07-29 2006-08-09 삼성전자주식회사 Self refresh period control circuits
JP4747288B2 (en) * 2009-04-03 2011-08-17 株式会社バッファロー External storage device and a control method thereof
US20110154023A1 (en) 2009-12-21 2011-06-23 Smith Ned M Protected device management
US9411975B2 (en) 2014-03-31 2016-08-09 Intel Corporation Methods and apparatus to securely share data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5357573A (en) * 1991-08-12 1994-10-18 Intelligent Solution Services Gmbh Memory card
US5557674A (en) * 1993-07-22 1996-09-17 Kok-Wah Yeow Absolute static lock of files and directories on magnetic disk storage media in single machine personal microcomputers
US5598577A (en) * 1991-12-26 1997-01-28 Dell Usa, L.P. Computer system with automatic drive model ID recognition and drive type adaptation
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6067622A (en) * 1996-01-02 2000-05-23 Moore; Steven Jerome Software security system using remove function to restrict unauthorized duplicating and installation of an application program
US6175925B1 (en) * 1996-06-13 2001-01-16 Intel Corporation Tamper resistant player for scrambled contents
US6625730B1 (en) * 2000-03-31 2003-09-23 Hewlett-Packard Development Company, L.P. System for validating a bios program and memory coupled therewith by using a boot block program having a validation routine
US6983372B1 (en) * 2000-09-14 2006-01-03 Micron Technology, Inc. BIOS lock CD-ROM encode/decode driver

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5357573A (en) * 1991-08-12 1994-10-18 Intelligent Solution Services Gmbh Memory card
US5598577A (en) * 1991-12-26 1997-01-28 Dell Usa, L.P. Computer system with automatic drive model ID recognition and drive type adaptation
US5557674A (en) * 1993-07-22 1996-09-17 Kok-Wah Yeow Absolute static lock of files and directories on magnetic disk storage media in single machine personal microcomputers
US6067622A (en) * 1996-01-02 2000-05-23 Moore; Steven Jerome Software security system using remove function to restrict unauthorized duplicating and installation of an application program
US6175925B1 (en) * 1996-06-13 2001-01-16 Intel Corporation Tamper resistant player for scrambled contents
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6625730B1 (en) * 2000-03-31 2003-09-23 Hewlett-Packard Development Company, L.P. System for validating a bios program and memory coupled therewith by using a boot block program having a validation routine
US6983372B1 (en) * 2000-09-14 2006-01-03 Micron Technology, Inc. BIOS lock CD-ROM encode/decode driver
US7191345B2 (en) * 2000-09-14 2007-03-13 Micron Technology, Inc. BIOS lock encode/decode driver
US7225469B2 (en) * 2000-09-14 2007-05-29 Micron Technology, Inc. BIOS lock encode/decode driver
US20070250926A1 (en) * 2000-09-14 2007-10-25 Micron Electronics, Inc. Bios lock encode/decode driver

Also Published As

Publication number Publication date
US20050262574A1 (en) 2005-11-24
US7225469B2 (en) 2007-05-29
US8856551B2 (en) 2014-10-07
US20070250926A1 (en) 2007-10-25
US7191345B2 (en) 2007-03-13
US6983372B1 (en) 2006-01-03
US20050289654A1 (en) 2005-12-29
US7917962B2 (en) 2011-03-29

Similar Documents

Publication Publication Date Title
EP0669064B1 (en) Apparatus and method for providing data security in a computer system having a removable memory
US6993649B2 (en) Method of altering a computer operating system to boot and run from protected media
US6651171B1 (en) Secure execution of program code
JP4728120B2 (en) System and method for protecting a portable data
US5944821A (en) Secure software registration and integrity assessment in a computer system
US8875266B2 (en) System and methods for enforcing software license compliance with virtual machines
CA2044522C (en) Apparatus and method for loading a system reference diskette image from a system partition in a personal computer system
US5836010A (en) Personal computer using chip-in card to prevent unauthorized use
CN101416195B (en) Computer system to control access to a storage device
US6324649B1 (en) Modified license key entry for pre-installation of software
JP3998405B2 (en) Access control method and a storage apparatus using the same
CN1296854C (en) Security system and method for computers
US7814532B2 (en) Data processing system and method for password protecting a boot device
US7873837B1 (en) Data security for electronic data flash card
US8930713B2 (en) System and method for general purpose encryption of data
US5163147A (en) Computer system with file security function
KR930004902B1 (en) Apparatus and method for preventing unauthorized access to bios to bios in a personal computer system
CN1320552C (en) Secure flash memory device and method of operation
US7149854B2 (en) External locking mechanism for personal computer memory locations
US5892902A (en) Intelligent token protected system with network authentication
US5748744A (en) Secure mass storage system for computers
EP0770997A2 (en) Password protection for removable hard drive
US7712131B1 (en) Method and apparatus for storage and use of diagnostic software using removeable secure solid-state memory
US6915420B2 (en) Method for creating and protecting a back-up operating system within existing storage that is not hidden during operation
US6976136B2 (en) Flash memory protection scheme for secured shared BIOS implementation in personal computers with an embedded controller

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MEI CALIFORNIA, INC.;REEL/FRAME:026014/0246

Effective date: 20010322

Owner name: MICRON ELECTRONICS, INC., IDAHO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALLEN, DUANE;REEL/FRAME:026013/0898

Effective date: 20000815

Owner name: MEI CALIFORNIA, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICRON ELECTRONICS, INC.;REEL/FRAME:026014/0135

Effective date: 20010322

AS Assignment

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN

Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001

Effective date: 20160426

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001

Effective date: 20160426

AS Assignment

Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001

Effective date: 20160426

MAFP

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551)

Year of fee payment: 4

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY INTEREST;ASSIGNORS:MICRON TECHNOLOGY, INC.;MICRON SEMICONDUCTOR PRODUCTS, INC.;REEL/FRAME:047540/0001

Effective date: 20180703

AS Assignment

Owner name: MICRON TECHNOLOGY, INC., IDAHO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:047243/0001

Effective date: 20180629